Code based fuzzy extractor for biometric keys
Journal Title: КОМП’ЮТЕРНІ НАУКИ ТА КІБЕРБЕЗПЕКА - Year 2018, Vol 3, Issue 11
Abstract
In this paper methods of forming cryptographic keys from biometric images using fuzzy extractors are considered. A new scheme of a fuzzy extractor based on the McEliece cryptosystem is proposed. It is shown that the new design of the fuzzy extractor allows forming cryptographic passwords from biometric images even without the use of non-secret helper string. When using helper string, the proportion of corrected distortions of biometric images increases significantly. In addition, the proposed design relates to a class of post-quantum information security methods, i.e. it is expected to be safely used even for solving cryptanalysis problems with universal quantum computers.
Authors and Affiliations
Alexandr Kuznetsov, Anastasia Kiyan, Roman Serhiienko, Anna Uvarova, Dmytro Prokopovych-Tkachenko
THE CONCEPT OF DIAGNOSTIC DATA ERRORS OF COMPUTING SYSTEMS WITCH FUNCTIONING IN THE SYSTEM OF RESIDUE CLASSES
A method for diagnosing data of computer systems functioning in the system of residue classes (SRC) has been developed. This method is based on the use of orthogonal bases, which are formed from a complete base system. T...
Mathematical model and methods of processing biometric images of fingerprints
Today, using of personal identification technologies based on biometric parameters for access to information resources is becoming topical in connection with the increase of informatization in modern society. Physical ch...
ЗАСТОСУВАННЯ КРИПТОАЛГОРИТМІВ В ДЕЦЕНТРАЛІЗОВАНИХ МЕРЕЖАХ ТА ПЕРСПЕКТИВИ ЇХ ЗАМІНИ ДЛЯ ПОСТКВАНТОВОГО ПЕРІОДУ
В роботі проведено огляд використовуваних у блокчейн системах електронних підписів та функцій хешування. Наведено криптографічні алгоритми, які використовуються або можуть використовуватися в децентралізованих мережах. П...
Сompilations method and semantic verification time parameterized of multiparallel programs
It provides definitions vremyaparametrizovannyh multiparallelnyh programs that (in contrast to the conventional treatment of parallel programs) contain moments of the start of operations specifications / features, as wel...
Testing the speed of modern stream ciphers
The paper is a continuation of numerous studies of a candidate for encryption national standard of Ukraine, the Strumok new symmetric stream cipher. The result of a study is compare the most famous algorithms of stream c...